Advertisement

Rich QR Code for Multimedia Management Applications

  • Iuliia TkachenkoEmail author
  • William Puech
  • Olivier Strauss
  • Christophe Destruel
  • Jean-Marc Gaudin
  • Christian Guichard
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9280)

Abstract

The Quick Response (QR) code is the most popular graphical code in the world today. These codes are used for storage of information, but they have a limited storage capacity. In this paper, we present a two level QR (2LQR) code, which stores information on two levels. The first (public) level is accessible to everyone and can be read by any classical QR code reader. The second (supplementary) level is readable only by a selected group of users, which have a specific reader application. This code increases storage capacity of standard QR code. We use specific textured patterns for construction of a second level. We also suggest a blind pattern recognition method, which is based on maximization of correlation values.

Keywords

QR code Two level stored information Pattern recognition Print-and-scan process Multimedia management application 

References

  1. 1.
    15420:2009, I.: Information technology - Automatic identification and data capture techniques - EAN/UPC bar code symbology specification (2009)Google Scholar
  2. 2.
    16022:2006, I.: Information technology - Automatic identification and data capture techniques - Data Matrix bar code symbology specification (2006)Google Scholar
  3. 3.
    18004:2000, I.: Information technology - Automatic identification and data capture techniques - Bar code symbology - QR Code (2000)Google Scholar
  4. 4.
    Baharav, Z., Kakarala, R.: Visually significant QR codes: Image blending and statistical analysis. In: IEEE International Conference on Multimedia and Expo, ICME 2013, July 15–19, pp. 1–6, San Jose, California, USA (2013)Google Scholar
  5. 5.
    Baras, C., Cayre, F.: 2D bar-codes for authentication: A security approach. In: The 20th European Signal Processing Conference, EUSIPCO 2012, August 27–31, pp. 1760–1766. Bucharest, Romania (2012)Google Scholar
  6. 6.
    Bui, T.V., Vu, N.K., Nguyen, T.T., Echizen, I., Nguyen, T.D.: Robust message hiding for QR code. In: 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 520–523. IEEE (2014)Google Scholar
  7. 7.
    Lin, P.Y., Chen, Y.H., Lu, E.J.L., Chen, P.J.: Secret hiding mechanism using QR barcode. In: 2013 International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), pp. 22–25. IEEE (2013)Google Scholar
  8. 8.
    Querini, M., Grillo, A., Lentini, A., Italiano, G.F.: 2D color barcodes for mobile phones. IJCSA 8(1), 136–155 (2011)Google Scholar
  9. 9.
    Querini, M., Italiano, G.F.: Facial biometrics for 2D barcodes. In: IEEE Federated Conference on Computer Science and Information Systems, FedCSIS 2012, September 9–12, pp. 755–762, Wroclaw, Poland (2012)Google Scholar
  10. 10.
    Sklar, B.: Digital communications, vol. 2. Prentice Hall, NJ (2001)Google Scholar
  11. 11.
    Tkachenko, I., Puech, W., Strauss, O., Gaudin, J.M., Destruel, C., Guichard, C.: Fighting against forged documents by using textured image. In: The 22nd European Signal Processing Conference, EUSIPCO 2014, September 1–5, pp. 790–794, Lisbon, Portugal (2014)Google Scholar
  12. 12.
    Villán, R., Voloshynovskiy, S., Koval, O., Pun, T.: Multilevel 2d bar codes: Towards high capacity storage modules for multimedia security and management. IEEE Transactions on Information Forensics and Security 1(4), 405–420 (2006)CrossRefGoogle Scholar
  13. 13.
    Yu, L., Niu, X., Sun, S.: Print-and-scan model and the watermarking countermeasure. In: Image and Vision Computing, vol. 23, pp. 807–814. Elsevier (2005)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Iuliia Tkachenko
    • 1
    • 2
    Email author
  • William Puech
    • 1
  • Olivier Strauss
    • 1
  • Christophe Destruel
    • 2
  • Jean-Marc Gaudin
    • 2
  • Christian Guichard
    • 2
  1. 1.LIRMM, UMR CNRS 5506University of MontpellierMontpellierFrance
  2. 2.Authentication IndustriesMontpellierFrance

Personalised recommendations